A CRITIQUE OF USER AUTHENTICATION METHODS

AGHOLOR S.; TIJANI R. A.; AGHOLOR A. O.; MAR’RUF-SOGEYINBO A. A. & ADIGUN I.O.

Abstract


There is a growing demand for user authentication technologies for both online and in physical systems. The major reason for authentication is to restrict access to account owner’s information. Organizations have been facing difficulties in selecting the best authentication method that fits the security of their systems from the wide varieties of existing authentication methods. In this study, we explored the different methods of authentication using systematic literature review. The result of the review showed that authentication methods can be broadly classified into three. Furthermore, the result from the review showed the advantages and disadvantages of each of the three types of authentication methods. The requirements for implementing each were identified. Our aim is to give a guide to organizations in choosing the best option to use when implementing her authentication system.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.